Research by finding an article or case study discussing ONE of the following computer crimes/incidents:
1) Network intrusions
2) Destruction of data and information
3) Denial of service attack
4) Theft of logins and passwords
5) Malicious code and programs
6) IP spoofing
7) Information warfare